Off By One Security
28.5K subscribers
1:36:29
An OpSec look at the DarkNet Dark Web Marketplace DNM Bible Part 2
Off By One Security
736 views • 2 weeks ago
1:02:31
An OpSec look at the DarkNet/Dark Web Marketplace DNM Bible Part 1
Off By One Security
1.5K views • 4 weeks ago
38:33
Format String Vulnerabilities and Exploitation Are they still be useful
Off By One Security
1.3K views • 2 months ago
10:49
The Darknet Marketplace (DNM) Bible - Should I do a series walking through it?
Off By One Security
4.7K views • 5 months ago
1:25:55
Introduction to JavaScript and V8 for Browser Exploitation
Off By One Security
1.6K views • 5 months ago
0:57
Windows Internals What is the CONTEXT structure
Off By One Security
2K views • 1 year ago
16:34
Creating FLIRT Signatures in IDA Pro for CTF's, Malware, etc...
Off By One Security
2.9K views • 1 year ago
17:13
Recreating Undocumented Structures Using Local Types in IDA Pro
Off By One Security
1.6K views • 1 year ago
1:44:37
Return Oriented Shellcode (ROP Shellcode)
Off By One Security
1.8K views • 1 year ago
55:20
Introduction to Linux Heap Exploitation
Off By One Security
3.2K views • 1 year ago
2:34:38
A Look at Modern Windows Kernel Exploitation
Off By One Security
4.7K views • 1 year ago
1:03:27
Modern Windows Binary Patch Diffing!
Off By One Security
1.9K views • 1 year ago
1:19:00
Reverse Engineering Windows Exploit Mitigations - Do Not Allow Child Proc
Off By One Security
1.3K views • 1 year ago
50:36
Hacking Google Cloud Platform (GCP)
Off By One Security
1.6K views • 1 year ago
1:25:23
Browser Exploitation Introduction: Part 2 - UAF Against IE11 Bypassing MemGC
Off By One Security
1.2K views • 1 year ago
46:35
Return Oriented Shellcode
Off By One Security
2.5K views • 2 years ago
51:56
Hacker Techniques Introduction to Buffer Overflows
Off By One Security
13K views • 2 years ago
1:38
What is the Off by One Security Stream
Off By One Security
3.4K views • 2 years ago
End of Videos